ZombieCoin: Powering Next-Generation Botnets with Bitcoin

@inproceedings{Ali2015ZombieCoinPN,
  title={ZombieCoin: Powering Next-Generation Botnets with Bitcoin},
  author={Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen Lee and Feng Hao},
  booktitle={Financial Cryptography Workshops},
  year={2015}
}
Botnets are the preeminent source of online crime and arguably the greatest threat to the Internet infrastructure. In this paper, we present ZombieCoin, a botnet command-and-control (C&C) mechanism that runs on the Bitcoin network. ZombieCoin offers considerable advantages over existing C&C techniques, most notably the fact that Bitcoin is designed to resist the very regulatory processes currently used to combat botnets. We believe this is a desirable avenue botmasters may explore in the near… Expand
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
TLDR
This paper presents ZombieCoin, a botnet command-and-control (C&C) mechanism that leverages the Bitcoin network that offers considerable advantages over existing C&C techniques, most notably the fact that Bitcoin is designed to resist the very same takedown campaigns and regulatory processes to combat botnets today. Expand
Misusing bitcoin for botnet command and control communication
TLDR
This work has the objective of mixing the different proposals so as to show their actual feasibility and address the issues that might come out in a real life implementation of the botnet communication system. Expand
Whispering Botnet Command and Control Instructions
TLDR
The use of a novel technology, Whisper, for command and control instruction dissemination, which allows a botmaster to control bots at virtually zero cost, while providing a peer-to-peer communication infrastructure, as well as privacy and encryption as part of its dark communication strategy. Expand
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
TLDR
This paper proposes a communication protocol and analyzes its viability in real life, showing that this approach would enable a botmaster to build a robust and hard-to-disrupt C&C system at virtually no cost, thus representing a realistic threat for which countermeasures should be devised. Expand
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network
TLDR
A new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot, which achieves better scalibility compared to the other similar blockchain botnets with negligible costs. Expand
DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network
TLDR
A novel P2P botnet model based on Bitcoin transactions to prepare for new cyber threats and a covert, duplex, and low-cost command and control (C&C) channel in the Bitcoin network is presented in this work. Expand
Bitcoin: Perils of an Unregulated Global P2P Currency
TLDR
It is argued that Bitcoin has become both a highly useful tool for criminals and a lucrative target for crime, and this arises from the same essential ideological and design choices that have driven Bitcoin's success to date. Expand
Analysis and Takeover of the Bitcoin-Coordinated Pony Malware
TLDR
A security flaw in the C&C addressing is identified, which is used to perform a takeover of the malware's loading mechanism to quantify the volume and origin of the incoming infections. Expand
On distributed ledgers security and illegal uses
TLDR
This paper evaluates several Distributed Ledger Technologies (DLTs) features depicting the Bitcoin, Ripple, Ethereum, Hyperledger, Algorand and IOTA networks, focusing on their security challenges and exposing numerous threats and vulnerabilities. Expand
DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things
  • Qaisar Shafi, A. Basit
  • Computer Science
  • 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
  • 2019
TLDR
This work focuses on the development of a botnet prevention system for Internet of Things (IoT) that uses the benefits of both Software Defined Networking (SDN) and Distributed Blockchain (DBC) and simulates and analyze that using blockchain and SDN. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 72 REFERENCES
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
TLDR
This paper outlines the origins and structure of bots and botnets and uses data from the operator community, the Internet Motion Sensor project, and a honeypot experiment to illustrate the botnet problem today and describes a system to detect botnets that utilize advanced command and control systems by correlating secondary detection data from multiple sources. Expand
Botnets: A survey
TLDR
A comprehensive review that broadly discusses the botnet problem, briefly summarizes the previously published studies and supplements these with a wide ranging discussion of recent works and solution proposals spanning the entire botnet research field is presented. Expand
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
TLDR
This paper proposes an approach that uses network-based anomaly detection to identify botnet C&C channels in a local area network without any prior knowledge of signatures or C &C server addresses, and shows that BotSniffer can detect real-world botnets with high accuracy and has a very low false positive rate. Expand
Overbot: a botnet protocol based on Kademlia
TLDR
Overbot is introduced, a botnet communication protocol based on a peer-to-peer architecture that leverages Kademlia, an existing P2P protocol, to implement a stealth command and control channel that an attacker can neither learn the IP addresses of other nodes in the botnet nor disrupt the message exchange between the botmaster and the bots. Expand
An Advanced Hybrid Peer-to-Peer Botnet
TLDR
This paper presents the design of an advanced hybrid peer-to-peer botnet, which provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. Expand
Botnet Economics: Uncertainty Matters
TLDR
This chapter model botnet-related cybercrimes as a result of profit-maximizing decision-making from the perspectives of both botnet masters and renters/attackers and proposes the idea of using virtual bots (honeypots running on virtual machines) to create uncertainty in the level of botnet attacks. Expand
Walowdac - Analysis of a Peer-to-Peer Botnet
TLDR
A clone of the Waledac bot named Walowdac is implemented, which implements the communication features of Walingac but does not cause any harm, i.e., no spam emails are sent and no other commands are executed. Expand
Your botnet is my botnet: analysis of a botnet takeover
TLDR
This paper reports on efforts to take control of the Torpig botnet and study its operations for a period of ten days, which provides a new understanding of the type and amount of personal information that is stolen by botnets. Expand
Stegobot: A Covert Social Network Botnet
TLDR
Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month. Expand
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
TLDR
This paper presents a general detection framework that is independent of botnet C&C protocol and structure, and requires no a priori knowledge of botnets (such as captured bot binaries and hence the botnet signatures, and C &C server names/addresses). Expand
...
1
2
3
4
5
...